Sonrai Security website logo for identity and data governance and cloud security

Blog

Category:
Cloud Complexities Create Chaos
June 23, 2020
Cloud Complexities Create Chaos

Understand and better manage your organizations sensitive data by reducing the complexity of your public cloud data and identity access.

Read More
Enforcing Security in the Gig Economy
June 18, 2020
Enforcing Security in the Gig Economy

The gig economy is growing larger with each passing year, as companies embrace flexibility and more and more workers start […]

Read More
[Webinar Recap] Achieving and Maintaining Least Privilege
June 9, 2020
[Webinar Recap] Achieving and Maintaining Least Privilege

Read our webinar recap to understand how your organization can get to and maintain the Principle of Least Privilege.

Read More
Identities Are Still The New Perimeter
June 2, 2020
Identities Are Still The New Perimeter

Understand the new perimeter of the modern enterprise and learn how public clouds are shifting the IAM model.

Read More
[CloudBytes Recap] Why Your Cloud Migration Needs a New Approach to Security and Governance
May 26, 2020
[CloudBytes Recap] Why Your Cloud Migration Needs a New Approach to Security and Governance

We breakdown the top-level cloud security takeaways from our session at the CSA CloudBytes virtual event on May 26.

Read More
VMblog Expert Interview: Getting Ready for CloudBytes Connect with Sonrai Security
May 20, 2020
VMblog Expert Interview: Getting Ready for CloudBytes Connect with Sonrai Security

By focusing on data and users, Sonrai offers the ability to assess and reduce risk, comprehensively monitor usage and movement, and enforce accountability on the most critical assets.

Read More
[Webinar Recap] Why WFH & Cloud Will Permanently Change Enterprise Cloud Security
May 5, 2020
[Webinar Recap] Why WFH & Cloud Will Permanently Change Enterprise Cloud Security

Missed our recent webinar? It was a good one for those worried about WFH and enterprise cloud security. In this […]

Read More
Data Breach Is Result Of A Failed Cloud Security Strategy
April 2, 2020
Data Breach Is Result Of A Failed Cloud Security Strategy

Marriott International, one of the largest hotel conglomerates in the world, experienced a massive cloud security data breach.

Read More
How to Determine Your Blast Radius
April 2, 2020
How to Determine Your Blast Radius

Understand how to measure the blast radius and get the total impact of a potential security event in your public cloud

Read More
Google Cloud Deep Dive
March 26, 2020
Google Cloud Deep Dive

Understand the top security considerations for Google Cloud.

Read More
magnifier